Skip to content

[New Rule] Google Threat Intelligence URL IOC Correlation #4880

Open
@niraj-crest

Description

@niraj-crest

Description

Description

This rule aims to correlate URL found in event data with Google Threat Intelligence Threat List indicators to identify potentially malicious or suspicious activity. The rule avoids matching against Google Threat Intelligence’s own logs (event.module: "ti_google_threat_intelligence") to ensure external observations are flagged.

Rule Configuration

Source Custom Query

NOT event.module : "ti_google_threat_intelligence"

Indicator Index Patterns

logs-ti_google_threat_intelligence_latest.dest_url_ioc-*

Indicator Index Query

@timestamp >= "now-30d/d"

Indicator Mapping

Field Indicator index field
url.original threat.indicator.url.original
threat.indicator.url.original threat.indicator.url.original

Required Fields

threat.indicator.url.original

Indicator Prefix Override

gti.threat.indicator

Related Integration

Google Threat Intelligence

Tags

[
  "Google Threat Intelligence",
  "URL IOC",
  "Elastic",
  "Threat Intelligence"
]

Target Ruleset

threat_intel

Target Rule Type

Indicator Match

Tested ECS Version

8.16.0

Query

No response

New fields required in ECS/data sources for this rule?

No response

Related issues or PRs

No response

References

No response

Redacted Example Data

No response

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions